Skip to content

Commit 449343c

Browse files
authored
Merge pull request #271745 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 20b1ea1 + 2be8bb0 commit 449343c

File tree

6 files changed

+10
-64
lines changed

6 files changed

+10
-64
lines changed

articles/load-balancer/load-balancer-outbound-connections.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,8 @@ Azure NAT Gateway simplifies outbound-only Internet connectivity for virtual net
6262

6363
Using a NAT gateway is the best method for outbound connectivity. A NAT gateway is highly extensible, reliable, and doesn't have the same concerns of SNAT port exhaustion.
6464

65+
NAT gateway takes precedence over other outbound connectivity methods, including a load balancer, instance-level public IP addresses, and Azure Firewall.
66+
6567
For more information about Azure NAT Gateway, see [What is Azure NAT Gateway](../virtual-network/nat-gateway/nat-overview.md).
6668

6769
## 3. Assign a public IP to the virtual machine
@@ -74,7 +76,7 @@ For more information about Azure NAT Gateway, see [What is Azure NAT Gateway](..
7476

7577
Traffic returns to the requesting client from the virtual machine's public IP address (Instance Level IP).
7678

77-
Azure uses the public IP assigned to the IP configuration of the instance's NIC for all outbound flows. The instance has all ephemeral ports available. It doesn't matter whether the VM is load balanced or not. This scenario takes precedence over the others.
79+
Azure uses the public IP assigned to the IP configuration of the instance's NIC for all outbound flows. The instance has all ephemeral ports available. It doesn't matter whether the VM is load balanced or not. This scenario takes precedence over the others, except for NAT Gateway.
7880

7981
A public IP assigned to a VM is a 1:1 relationship (rather than 1: many) and implemented as a stateless 1:1 NAT.
8082

articles/machine-learning/reference-yaml-job-parallel.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ ms.date: 09/27/2022
3636
| `task` | object | **Required.** The template for defining the distributed tasks for parallel job. See [Attributes of the `task` key](#attributes-of-the-task-key).|||
3737
|`input_data`| object | **Required.** Define which input data will be split into mini-batches to run the parallel job. Only applicable for referencing one of the parallel job `inputs` by using the `${{ inputs.<input_name> }}` expression|||
3838
| `mini_batch_size` | string | Define the size of each mini-batch to split the input.<br><br> If the input_data is a folder or set of files, this number defines the **file count** for each mini-batch. For example, 10, 100.<br>If the input_data is a tabular data from `mltable`, this number defines the proximate physical size for each mini-batch. For example, 100 kb, 100 mb. ||1|
39+
| `partition_keys` | list | The keys used to partition dataset into mini-batches.<br><br>If specified, the data with the same key will be partitioned into the same mini-batch. If both `partition_keys` and `mini_batch_size` are specified, the partition keys will take effect. |||
3940
| `mini_batch_error_threshold` | integer | Define the number of failed mini batches that could be ignored in this parallel job. If the count of failed mini-batch is higher than this threshold, the parallel job will be marked as failed.<br><br>Mini-batch is marked as failed if:<br> - the count of return from run() is less than mini-batch input count. <br> - catch exceptions in custom run() code.<br><br> "-1" is the default number, which means to ignore all failed mini-batch during parallel job.|[-1, int.max]|-1|
4041
| `logging_level` | string | Define which level of logs will be dumped to user log files. |INFO, WARNING, DEBUG|INFO|
4142
| `resources.instance_count` | integer | The number of nodes to use for the job. | | 1 |

articles/private-link/private-endpoint-dns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -343,7 +343,7 @@ For Azure services, use the recommended zone names as described in the following
343343
>[!div class="mx-tdBreakAll"]
344344
>| Private link resource type | Subresource | Private DNS zone name | Public DNS zone forwarders |
345345
>|---|---|---|---|
346-
>| Azure Search (Microsoft.Search/searchServices) | searchService | privatelink.search.windows.us | search.windows.us |
346+
>| Azure Search (Microsoft.Search/searchServices) | searchService | privatelink.search.azure.us | search.azure.us |
347347
>| Azure Relay (Microsoft.Relay/namespaces) | namespace | privatelink.servicebus.usgovcloudapi.net | servicebus.usgovcloudapi.net |
348348
>| Azure Web Apps (Microsoft.Web/sites) | sites | privatelink.azurewebsites.us </br> scm.privatelink.azurewebsites.us | azurewebsites.us </br> scm.azurewebsites.us |
349349
>| Azure Event Hubs (Microsoft.EventHub/namespaces) | namespace | privatelink.servicebus.usgovcloudapi.net | servicebus.usgovcloudapi.net |

articles/sentinel/sap/configure-audit.md

Lines changed: 2 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -90,72 +90,15 @@ Track your SAP solution deployment journey through this series of articles:
9090

9191
1. Under **Event Selection**, choose **Classic event selection** and select all the event types in the list.
9292

93-
Alternatively, choose **Detail event selection**, review the list of message IDs listed in the [Recommended audit categories](#recommended-audit-categories) section of this article, and configure them in **Detail event selection**.
94-
9593
1. Select **Save**.
9694

9795
![Screenshot showing Static profile settings.](./media/configure-audit/create-profile-settings.png)
9896

9997
1. You'll see that the **Static Configuration** section displays the newly created profile. Right-click the profile and select **Activate**.
10098

10199
1. In the confirmation window select **Yes** to activate the newly created profile.
102-
103-
### Recommended audit categories
104-
105-
The following table lists Message IDs used by the Microsoft Sentinel solution for SAP® applications. In order for analytics rules to detect events properly, we strongly recommend configuring an audit policy that includes the message IDs listed below as a minimum.
106-
107-
| Message ID | Message text | Category name | Event Weighting | Class Used in Rules |
108-
| - | - | - | - | - |
109-
| AU1 | Logon successful (type=&A, method=&C) | Logon | Severe | Used |
110-
| AU2 | Logon failed (reason=&B, type=&A, method=&C) | Logon | Critical | Used |
111-
| AU3 | Transaction &A started. | Transaction Start | Non-Critical | Used |
112-
| AU5 | RFC/CPIC logon successful (type=&A, method=&C) | RFC Login | Non-Critical | Used |
113-
| AU6 | RFC/CPIC logon failed, reason=&B, type=&A, method=&C | RFC Login | Critical | Used |
114-
| AU7 | User &A created. | User Master Record Change | Critical | Used |
115-
| AU8 | User &A deleted. | User Master Record Change | Severe | Used |
116-
| AU9 | User &A locked. | User Master Record Change | Severe | Used |
117-
| AUA | User &A unlocked. | User Master Record Change | Severe | Used |
118-
| AUB | Authorizations for user &A changed. | User Master Record Change | Severe | Used |
119-
| AUD | User master record &A changed. | User Master Record Change | Severe | Used |
120-
| AUE | Audit configuration changed | System | Critical | Used |
121-
| AUF | Audit: Slot &A: Class &B, Severity &C, User &D, Client &E, &F | System | Critical | Used |
122-
| AUG | Application server started | System | Critical | Used |
123-
| AUI | Audit: Slot &A Inactive | System | Critical | Used |
124-
| AUJ | Audit: Active status set to &1 | System | Critical with Monitor Alert | Used |
125-
| AUK | Successful RFC call &C (function group = &A) | RFC Start | Non-Critical | Used |
126-
| AUM | User &B locked in client &A after errors in password checks | Logon | Critical with Monitor Alert | Used |
127-
| AUO | Logon failed (reason = &B, type = &A) | Logon | Severe | Used |
128-
| AUP | Transaction &A locked | Transaction Start | Severe | Used |
129-
| AUQ | Transaction &A unlocked | Transaction Start | Severe | Used |
130-
| AUR | &A &B created | User Master Record Change | Severe | Used |
131-
| AUT | &A &B changed | User Master Record Change | Severe | Used |
132-
| AUW | Report &A started | Report Start | Non-Critical | Used |
133-
| AUY | Download &A Bytes to File &C | Other | Severe | Used |
134-
| BU1 | Password check failed for user &B in client &A | Other | Critical with Monitor Alert | Used |
135-
| BU2 | Password changed for user &B in client &A | User Master Record Change | Non-Critical | Used |
136-
| BU4 | Dynamic ABAP code: Event &A, event type &B, check total &C | Other | Non-Critical | Used |
137-
| BUG | HTTP Security Session Management was deactivated for client &A. | Other | Critical with Monitor Alert | Used |
138-
| BUI | SPNego replay attack detected (UPN=&A) | Logon | Critical | Used |
139-
| BUV | Invalid hash value &A. The context contains &B. | User Master Record Change | Critical | Used |
140-
| BUW | A refresh token issued to client &A was used by client &B. | User Master Record Change | Critical | Used |
141-
| CUK | C debugging activated | Other | Critical | Used |
142-
| CUL | Field content in debugger changed by user &A: &B (&C) | Other | Critical | Used |
143-
| CUM | Jump to ABAP Debugger by user &A: &B (&C) | Other | Critical | Used |
144-
| CUN | A process was stopped from the debugger by user &A (&C) | Other | Critical | Used |
145-
| CUO | Explicit database operation in debugger by user &A: &B (&C) | Other | Critical | Used |
146-
| CUP | Non-exclusive debugging session started by user &A (&C) | Other | Critical | Used |
147-
| CUS | Logical file name &B is not a valid alias for logical file name &A | Other | Severe | Used |
148-
| CUZ | Generic table access by RFC to &A with activity &B | RFC Start | Critical | Used |
149-
| DU1 | FTP server allowlist is empty | RFC Start | Severe | Used |
150-
| DU2 | FTP server allowlist is non-secure due to use of placeholders | RFC Start | Severe | Used |
151-
| DU8 | FTP connection request for server &A successful | RFC Start | Non-Critical | Used |
152-
| DU9 | Generic table access call to &A with activity &B (auth. check: &C ) | Transaction Start | Non-Critical | Used |
153-
| DUH | OAuth 2.0: Token declared invalid (OAuth client=&A, user=&B, token type=&C) | User Master Record Change | Severe with Monitor Alert | Used |
154-
| EU1 | System change options changed ( &A to &B ) | System | Critical | Used |
155-
| EU2 | Client &A settings changed ( &B ) | System | Critical | Used |
156-
| EUF | Could not call RFC function module &A | RFC Start | Non-Critical | Used |
157-
| FU0 | Exclusive security audit log medium changed (new status &A) | System | Critical | Used |
158-
| FU1 | RFC function &B with dynamic destination &C was called in program &A | RFC Start | Non-Critical | Used |
100+
> [!NOTE]
101+
> Static configuration only takes effect after a system restart. For an immediate setup, create an additional dynamic filter with the same properties, by right clicking the newly created static profile and selecting "apply to dynamic configuration".
159102
160103
## Next steps
161104

articles/sentinel/sap/sap-deploy-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ For more information, see [ValidateSAP environment validation steps](prerequisit
225225
### No records / late records
226226

227227
The agent relies on time zone information to be correct. If you see that there are no records in the SAP audit and change logs, or if records are constantly a few hours behind, check if SAP report TZCUSTHELP presents any errors. Follow [SAP note 481835](<https://me.sap.com/notes/481835/E>) for more details.
228-
228+
Additionally, there can be issues with the clock on the VM where the Microsoft Sentinel solution for SAP® applications agent is hosted. Any deviation of the VM's clock from UTC will impact data collection. More importantly, the SAP VM's clock and the Sentinel agent's VM's clock should match.
229229

230230

231231
### Network connectivity issues

articles/sentinel/sap/sap-solution-deploy-alternate.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,13 +94,13 @@ az keyvault secret set \
9494
9595
#Add Azure Log ws ID
9696
az keyvault secret set \
97-
--name <SID>-LOG_WS_ID \
97+
--name <SID>-LOGWSID \
9898
--value "<logwsod>" \
9999
--description SECRET_AZURE_LOG_WS_ID --vault-name $kvname
100100
101101
#Add Azure Log ws public key
102102
az keyvault secret set \
103-
--name <SID>-LOG_WS_PUBLICKEY \
103+
--name <SID>-LOGWSPUBLICKEY \
104104
--value "<loswspubkey>" \
105105
--description SECRET_AZURE_LOG_WS_PUBLIC_KEY --vault-name $kvname
106106
```

0 commit comments

Comments
 (0)